{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T01:56:40Z","timestamp":1771898200846,"version":"3.50.1"},"reference-count":17,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Ada Lett."],"published-print":{"date-parts":[[2024,12,2]]},"abstract":"<jats:p>Industrial Control Systems (ICS) constitute the backbone of contemporary industrial operations, ranging from modest heating, ventilation, and air conditioning systems to expansive national power grids. Given their pivotal role in critical infrastructure, there has been a concerted effort to enhance security measures and deepen our comprehension of potential cyber threats within this domain. To address these challenges, numerous implementations of Honeypots and Honeynets intended to detect and understand attacks have been employed for ICS. This approach diverges from conventional methods by focusing on making a scalable and reconfigurable honeynet for cyber-physical systems. It will also automatically generate attacks on the honeynet to test and validate it. With the development of a scalable and reconfigurable Honeynet and automatic attack generation tools, it is also expected that the system will serve as a basis for producing datasets for training algorithms for detecting and classifying attacks in cyberphysical honeynets.<\/jats:p>","DOI":"10.1145\/3706601.3706617","type":"journal-article","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T23:20:07Z","timestamp":1733181607000},"page":"90-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reconfigurable and Scalable Honeynet for Cyber-physical Systems"],"prefix":"10.1145","volume":"44","author":[{"given":"Lu\u00eds","family":"Sousa","sequence":"first","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias da Universidade de Lisboa, Portugal"}]},{"given":"Jos\u00e9","family":"Cec\u00edlio","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias da Universidade de Lisboa, Portugal"}]},{"given":"Pedro M.","family":"Ferreira","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias da Universidade de Lisboa, Portugal"}]},{"given":"Alan","family":"Oliveira de S\u00e1","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias da Universidade de Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631891"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyac007"},{"key":"e_1_2_1_5_1","volume-title":"Trend Micro","author":"Hilt S.","unstructured":"S. Hilt, F. Maggi, C. Perine, L. Remorin, M. R\u00f6sler, and R. Vosseler, \"Caught in the act: Running a realistic factory honeypot to capture real threats,\" tech. rep., Trend Micro, Inc."},{"key":"e_1_2_1_6_1","first-page":"1","volume-title":"Honeyvp: A cost-effective hybrid honeypot architecture for industrial control systems,\" in ICC 2021 - IEEE International Conference on Communications","author":"You J.","year":"2021","unstructured":"J. You, S. Lv, Y. Sun, H. Wen, and L. Sun, \"Honeyvp: A cost-effective hybrid honeypot architecture for industrial control systems,\" in ICC 2021 - IEEE International Conference on Communications, pp. 1--6, 2021."},{"key":"e_1_2_1_7_1","volume-title":"CCS \"20, (New York","author":"L\u00f3pez-Morales E.","year":"2020","unstructured":"E. L\u00f3pez-Morales, C. Rubio-Medrano, A. Doup\u00e9, Y. Shoshitaishvili, R. Wang, T. Bao, and G.-J. Ahn, \"Honeyplc: A next-generation honeypot for industrial control systems,\" in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS \"20, (New York, NY, USA), p. 279--291, Association for Computing Machinery, 2020."},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D. Pliatsios P. Sarigiannidis T. Liatifis K. Rompolos and I. Siniosoglou \"A novel and interactive industrial control system honeypot for critical smart grid infrastructure \" in 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) pp. 1--6 2019.","DOI":"10.1109\/CAMAD.2019.8858431"},{"key":"e_1_2_1_9_1","first-page":"1","volume-title":"Computers and Communications (ISNCC)","author":"Conti M.","year":"2022","unstructured":"M. Conti, F. Trolese, and F. Turrin, \"Icspot: A highinteraction honeypot for industrial control systems,\" in 2022 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1--4, 2022."},{"key":"e_1_2_1_10_1","first-page":"91","volume-title":"CPS-SPC '15","author":"Antonioli D.","unstructured":"D. Antonioli and N. O. Tippenhauer, \"Minicps: A toolkit for security research on cps networks,\" in Proceedings of the First ACM Workshop on Cyber-Physical Systems- Security and\/or PrivaCy, CPS-SPC '15, (New York, NY, USA), p. 91--100, Association for Computing Machinery, 2015."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00044"},{"key":"e_1_2_1_12_1","first-page":"433","volume-title":"Man and Cybernetics (SMC)","author":"Bernieri G.","year":"2019","unstructured":"G. Bernieri, M. Conti, and F. Pascucci, \"Mimepot: a model-based honeypot for industrial control networks,\" in 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), pp. 433--438, 2019."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/218019a0"},{"key":"e_1_2_1_14_1","unstructured":"L. Rist \"Conpot.\" http:\/\/conpot.org\/. Accessed: 2024-01--5."},{"key":"e_1_2_1_15_1","unstructured":"\"Openplc.\" https:\/\/autonomylogic.com\/. Accessed: 2023--12--9."},{"key":"e_1_2_1_16_1","unstructured":"\"Docker.\" https:\/\/www.docker.com\/ get-started\/. Accessed: 2023--12--8."},{"key":"e_1_2_1_17_1","volume-title":"Cyber-physical systems security\"a survey,\" IEEE Internet of Things Journal","author":"Humayed A.","unstructured":"A. Humayed, J. Lin, F. Li, and B. Luo, \"Cyber-physical systems security\"a survey,\" IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1802--1831, 2017."}],"container-title":["ACM SIGAda Ada Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706601.3706617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706601.3706617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:40Z","timestamp":1750295920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706601.3706617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,12,2]]}},"alternative-id":["10.1145\/3706601.3706617"],"URL":"https:\/\/doi.org\/10.1145\/3706601.3706617","relation":{},"ISSN":["1094-3641"],"issn-type":[{"value":"1094-3641","type":"print"}],"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}